首页 | 本学科首页   官方微博 | 高级检索  
     


Threshold proxy re-signature: definition and new constructions
Authors:Xi Chen  Lein Harn  Ge Yao
Affiliation:1. Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing, PR China;2. Department of Computer Science and Electrical Engineering, School of Computer and Engineering, University of Missouri, Kansas City, USA;3. School of Engineering, University of Melbourne, Melbourne, Australia
Abstract:The previous threshold proxy re-signature schemes have been mainly constructed with bilinear maps, the implementations of which are much more time-consuming than exponentiation operations. To solve this problem, we propose efficient threshold proxy re-signature schemes which are constructed with El-Gamal signatures. The performance analysis shows that our schemes are more efficient than the existing threshold proxy re-signature schemes. Based on the discrete logarithm problem, our schemes are provable secure in the random oracle model.
Keywords:Information security  cryptography  secret sharing  proxy re-signature
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号